Korean
<< Back
VID 28175
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Novell Client software has a buffer overflow vulnerability in the 'ndppnt.dll' library. Novell Client for Windows is vulnerable to a buffer overflow attack, caused by improper bounds checking in the NDPS (Novell Distributed Print Services) Print Provider for Windows component (ndppnt.dll). By exploiting an unspecified vulnerability, a remote or local attacker could overflow a buffer and execute arbitraty code on the affected system or cause the system to crash.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974843.htm
http://secunia.com/advisories/23271

* Platforms Affected:
Novell Distributed Print Services (NDPS) versions prior to 4.91 Post-SP3
Microsoft Windows Any version
Recommendation Install the 491psp3_ndppnt.exe patch file, as listed in the Novell Technical Information Document TID2974843 at http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974843.htm
Related URL CVE-2006-6443 (CVE)
Related URL 21479 (SecurityFocus)
Related URL 30873 (ISS)